Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 170 from your keywords: subject="Computer networks"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Client-side attacks and defense
Comment Share
Shimonski, RobertOriyano, Sean-Philip

Terdapat indeks. Table of contents: Chapter 1. Client-Side Attacks Defined Client-Side Attacks: An Overview Types of Client-Side Attacks Chapter 2. Dissection of a Client-Side Attack What Constitutes a Client-Side Attack? Chapter 3. Protecting Web Browsers Common Functions of a Web Browser Microsoft Internet Explorer Mozilla Firefox Google Chrome Apple Safari Op…

Edition
--
ISBN/ISSN
9781597495905
Collation
xii, 278 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 SHI c
Availability1
Add to basket
MARC DownloadCite
cover
Hacking web apps: detecting and preventing web application security problems
Comment Share
Shema, MikeAlcover, Jorge Blanco

Terdapat indeks. Table of Contents: Chapter 1. HTML5 The New Document Object Model (DOM) Cross-Origin Resource Sharing (CORS) WebSockets Web Storage Web Workers Flotsam & Jetsam Chapter 2. HTML Injection & Cross-Site Scripting (XSS) Understanding HTML Injection Employing Countermeasures Chapter 3. Cross-Site Request Forgery (CSRF) Understanding Cross-Site Reques…

Edition
--
ISBN/ISSN
9781597499514
Collation
xx, 273 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 SHE h
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity and cyberwar: what everyone needs to know
Comment Share
Friedman, AllanSinger, Peter Warren

Contents: Introduction Why write book about cybersecurity and cyberwar Why is there a cybersecurity knowledge gap, and why does in matter How did you write the book and what do yo hope to accomplish Part I How it all works The world wide what? Defining cyberspace Where did this cyber stuff come from anyway? A short history of the internet How does the internet actually work Who run…

Edition
--
ISBN/ISSN
9780199918119
Collation
viii, 306 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 SIN c
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practice
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems Pa…

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Formal correctness of security protocols
Comment Share
Maurer, UeliBella, Giampaolo

Contents: 1.Introduction 1.1 Motivation 1.2 Contribution 1.3 Notation 1.4 Contents Outline 2. The Analysis of Security Protocols 2.1 Formal Approaches 2.2 Interpreting the Findings 3. The Inductive Method 3.1 Isabelle 3.2 Theory Hierarchy 3.3 Agents 3.4 Cryptographic Keys 3.5 Compromised Agents 3.6 Messages 3.7 Events 3.8 Traces 3.9 Threat Model 3.10 Operators…

Edition
--
ISBN/ISSN
9783540681342
Collation
xviii, 274 hlm.; 24 cm.
Series Title
--
Call Number
005.8 BEL f
Availability2
Add to basket
MARC DownloadCite
cover
Internet law: text and materials
Comment Share
Reed, Chris

Table of contents: Introduction 1. The Internet as a distributed environment 2. From each according to his ability: actors and activities in the Internet world 3. An infinity of scarce resources: ownership and use of Internet resources 4. New actors on a new stage: intermediary liability in the Internet world 5. On the Internet, nobody knows you're a dog: identity and identification 6.…

Edition
Second Edition
ISBN/ISSN
9780521605229
Collation
xliv, 328hal.; ilus.; 23 cm
Series Title
Law in context
Call Number
343.41 REE i
Availability1
Add to basket
MARC DownloadCite
cover
Readings in cyberethics
Comment Share
Tavani, Herman TSpinello, Richard A

Table of contents: Ch. 1. Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Ch. 2. Regulating the Net: Free Expression and Content Controls Ch. 3. Intellectual Property in Cuberspace Ch. 4. Privacy in Cyberspace Ch. 5. Security and Crime in Cyberspace Ch. 6. Professional Ethics, Codes of Conduct, and Computer/​Information Pro…

Edition
Second Edition
ISBN/ISSN
9780763724108
Collation
xviii, 697 hal.; ilus.; 23 cm
Series Title
--
Call Number
175 SPI r
Availability1
Add to basket
MARC DownloadCite
cover
Mastering Windows network forensics and investigation
Comment Share
Anson, SteveBunting, SteveJohnson, RyanPearson, Scott

Table of contents Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows Filesystems 179 C…

Edition
Second Edition
ISBN/ISSN
9781118163825
Collation
xxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 ANS m
Availability1
Add to basket
MARC DownloadCite
cover
Nmap cookbook: the fat-free guide to network scanning
Comment Share
Marsh, Nicholas

Table of contents: Section 1 Installing Nmap Section 2 Basic Scanning Techniques Section 3 Discovery Options Section 4 Advanced Scanning Options Section 5 Port Scanning Options Section 6 Operating System and Service Detection Section 7 Timing Options Section 8 Evading Firewalls Section 9 Output Options Section 10 Troubleshooting and Debugging Section 11 Ze…

Edition
--
ISBN/ISSN
1449902529
Collation
196 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 MAR n
Availability1
Add to basket
MARC DownloadCite
cover
Data mining tools for malware detection
Comment Share
Masud, MehedyKhan, LatifurThuraisingham, Bhavani M

Table of contents: ch. 1 Introduction 1.1.Trends 1.2.Data Mining and Security Technologies 1.3.Data Mining for Email Worm Detection 1.4.Data Mining for Malicious Code Detection 1.5.Data Mining for Detecting Remote Exploits 1.6.Data Mining for Botnet Detection 1.7.Stream Data Mining 1.8.Emerging Data Mining Tools for Cyber Security Applications 1.9.Organization of This Book 1.10.Nex…

Edition
--
ISBN/ISSN
9781439854549
Collation
xxx, 419 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 MAS d
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?